EP2240912A1 - System und verfahren für den zugang zu einem manipulationssicheren speichergerät in einer drahtlosen kommunikationsvorrichtung anhand biometrischer daten - Google Patents
System und verfahren für den zugang zu einem manipulationssicheren speichergerät in einer drahtlosen kommunikationsvorrichtung anhand biometrischer datenInfo
- Publication number
- EP2240912A1 EP2240912A1 EP09706064A EP09706064A EP2240912A1 EP 2240912 A1 EP2240912 A1 EP 2240912A1 EP 09706064 A EP09706064 A EP 09706064A EP 09706064 A EP09706064 A EP 09706064A EP 2240912 A1 EP2240912 A1 EP 2240912A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- user
- biometric sample
- data
- wireless communication
- storage device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
Definitions
- Various features pertain to wireless communication devices. At least one aspect pertains to a system and method for accessing a tamperproof storage device in a wireless communication device using biometric data.
- Authentication data such as usernames and passwords
- the usernames and passwords also help to maintain security of personal and sensitive information and enable a user to use various Internet services securely, such as purchasing items.
- Passwords are kept secret from those not allowed access to the information and accounts, and those wishing to gain access are tested on whether or not they know the password and are granted or denied access accordingly.
- a system and method is needed for storing sensitive information or data, such as usernames and passwords, credit card numbers, bank account numbers, and the like, in a tamperproof storage device of a wireless communication device that may be accessible by the user but to no one else.
- One feature provides a system and method for accessing a tamperproof storage device in a wireless communication device using biometric data.
- a wireless communication device may include a biometric sensor, a memory device coupled to the biometric sensor, a processing circuit coupled to the memory device, and a tamperproof storage device protected from external access, coupled to the processing circuit.
- the biometric sensor may be used for capturing a biometric sample of a user trying to access the tamperproof storage device and may be a fingerprint scanner, an iris scanner, facial recognition device, a hand scanner and a voice recognition device.
- the memory device may be used for storing known biometric samples of users.
- the processing circuit may be configured to (a) compare the captured biometric sample to the known biometric sample stored in the memory device, (b) extract data from a tamperproof storage device if the captured biometric sample matches the known biometric sample, and (c) present the extracted data to the user for a preset amount of time.
- the preset amount of time may be set by the processing circuit or may be user defined and the data may no longer be available to the user when the preset amount of time has lapsed.
- the tamperproof storage device may be used for storing personal and sensitive information or data and may be a protected area within the memory device or may be a separate memory component.
- a user may input data into the temporary storage device using a user interface.
- the user interface may be a keypad.
- the data may include one or more credit card numbers, passwords, secret locker code numbers, automated teller machine (ATM) personal identification numbers (PIN), insurance policy numbers, social security numbers and/or driver license numbers.
- ATM automated teller machine
- PIN personal identification numbers
- insurance policy numbers social security numbers and/or driver license numbers.
- the extracted data may be presented to the user on a display of the wireless communication device.
- the wireless communication device may further include an authentication module within the processing circuit for comparing the captured biometric sample of the user to the known biometric sample of the user to authenticate the identity of the user.
- a method operational on a wireless communication device comprising: (a) capturing a biometric sample of a user, (b) comparing the captured biometric sample to a known biometric sample of the user stored in a memory device, (c) extracting data from a tamperproof storage device if the captured biometric sample matches the known biometric sample, and (d) presenting the extracted data to the user for a preset amount of time.
- a wireless communication device comprising: (a) means for capturing a biometric sample of a user, (b) means for storing a known biometric sample of the user, (c) means for comparing the captured biometric sample to the known biometric sample stored in a memory device, (d) means for extracting data from a tamperproof storage device if the captured biometric sample matches the known biometric sample, (e) and means for presenting the extracted data to the user for a preset amount of time.
- a processor readable medium having one or more instructions for accessing data in a wireless communication device which when executed by a processor causes the processor to (a) capture a biometric sample of a user, (b) compare the captured biometric sample to a known biometric sample stored in a memory device of the wireless communication device, (c) extract data from a tamperproof storage device in the wireless communication device if the captured biometric sample matches the known biometric sample, and (d) present the extracted data to the user for a preset amount of time.
- a circuit is provided to (a) capture a biometric sample of a user, (b) compare the captured biometric sample to a known biometric sample stored in a memory device of the wireless communication device, (c) extract data from a tamperproof storage device in the wireless communication device if the captured biometric sample matches the known biometric sample, and (d) present the extracted data to the user for a preset amount of time.
- Figure 1 is a block diagram illustrating a wireless communication device configured to authenticate a user requesting access to data stored in a tamperproof storage device of the wireless communication device.
- Figure 2 illustrates an alternative configuration of the wireless communication device in Figure 1.
- Figure 3 is a flow diagram illustrating a method operational in a wireless communication device for registering a user with an authentication application of the wireless communication device.
- Figure 4 is a flow diagram illustrating a method operational in a wireless communication device for accessing data in a tamperproof storage device of the wireless communication device.
- Figure 5 (comprising Figures 5A, 5B, and 5C) is a flow diagram illustrating a method operational in a wireless communication device for deleting, adding, modifying or viewing data in a tamperproof storage device of the wireless communication device.
- the embodiments may be described as a process that is depicted as a flowchart, a flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged.
- a process is terminated when its operations are completed.
- a process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc. When a process corresponds to a function, its termination corresponds to a return of the function to the calling function or the main function.
- a storage medium may represent one or more devices for storing data, including read-only memory (ROM), random access memory (RAM), magnetic disk storage mediums, optical storage mediums, flash memory devices and/or other machine readable mediums for storing information.
- ROM read-only memory
- RAM random access memory
- magnetic disk storage mediums magnetic disk storage mediums
- optical storage mediums flash memory devices and/or other machine readable mediums for storing information.
- machine readable medium includes, but is not limited to portable or fixed storage devices, optical storage devices, wireless channels and various other mediums capable of storing, containing or carrying instruction(s) and/or data.
- embodiments may be implemented by hardware, software, firmware, middleware, microcode, or any combination thereof.
- the program code or code segments to perform the necessary tasks may be stored in a machine-readable medium such as a storage medium or other storage(s).
- a processor may perform the necessary tasks.
- a code segment may represent a procedure, a function, a subprogram, a program, a routine, a subroutine, a module, a software package, a class, or any combination of instructions, data structures, or program statements.
- a code segment may be coupled to another code segment or a hardware circuit by passing and/or receiving information, data, arguments, parameters, or memory contents. Information, arguments, parameters, data, etc. may be passed, forwarded, or transmitted via any suitable means including memory sharing, message passing, token passing, network transmission, etc.
- DSP digital signal processor
- ASIC application specific integrated circuit
- FPGA field programmable gate array
- a general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine.
- a processor may also be implemented as a combination of computing components, e.g., a combination of a DSP and a microprocessor, a number of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
- the methods or algorithms described in connection with the examples disclosed herein may be embodied directly in hardware, in a software module executable by a processor, or in a combination of both, in the form of processing unit, programming instructions, or other directions, and may be contained in a single device or distributed across multiple devices.
- a software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
- a storage medium may be coupled to the processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor.
- One feature provides a system and method for accessing data stored in a secure or tamperproof storage device in a wireless communication device.
- the tamperproof storage device may be a protected area within a memory device of the wireless communication device or may be a separate component or module within the wireless communication device.
- a method is provided for allowing a user access to data, such as usernames and passwords, credit card numbers, bank account numbers, and the like, stored in a secure, tamperproof device within a wireless communication device and prevent access to unauthorized users.
- the wireless communication device may include a biometric sensor for capturing a biometric sample of the user.
- the captured biometric sample may be compared to known biometric samples of users stored in the memory device of the wireless communication device. If the captured biometric sample matches one of the known biometric samples, the user is allowed access to the tamperproof storage device for a preset amount of time. When the preset amount of time has lapsed, access to the tamperproof storage device is terminated.
- the user may delete existing data, add new data, modify existing data or view existing data stored in the tamperproof storage device. In this manner, a user may store information or data within the wireless communication device that may only be accessed by the user as biometric samples are unique to each user.
- FIG. 1 is a block diagram illustrating a wireless communication device 100 configured to authenticate a user requesting access to a tamperproof storage device of the wireless communication device 100.
- a wireless communication device include a mobile terminal, a personal digital assistant, a mobile phone or cell phone.
- the wireless communication device 100 may include a processing circuit 102 coupled to a wireless communication interface or a transceiver 104.
- the transceiver 104 may be coupled to an antenna 106 to communicate with access nodes, in a wireless communication system, and a memory device 108 to store known biometric samples of users, i.e. biometric samples previously provided by one or more users for verifying or authenticating the identity of the users.
- the known biometric samples may include, but are not limited to, voice characteristics, iris patterns, facial features, fingerprints and palm prints.
- the processing circuit 102 may include an authentication or comparison module 110 configured to authenticate a user trying to access information or data stored in the wireless communication device 100 by comparing the known biometric samples stored in the memory device 108 to a biometric sample of a user captured by a biometric sensor 112.
- the biometric sensor 112 may include, but is not limited to, a fingerprint scanner, an iris scanner, a facial recognition device, a hand scanner and a voice recognition device.
- the wireless communication device 100 may include a tamperproof storage device 114, located within the memory device 108, for storing data or sensitive information, such as credit card numbers, passwords, secret locker code numbers, automated teller machine (ATM) personal identification numbers (PIN), insurance policy numbers, bank account numbers, social security numbers, driver license numbers and the like.
- data or sensitive information such as credit card numbers, passwords, secret locker code numbers, automated teller machine (ATM) personal identification numbers (PIN), insurance policy numbers, bank account numbers, social security numbers, driver license numbers and the like.
- the tamperproof storage device 114 may be protected from external access, but may be available to an authentication application of the wireless communication device 100.
- the processing circuit 102 may be configured to add data to the tamperproof storage device 114.
- the processing circuit 102 may also be configured to allow new users to add their biometric sample to the known biometric samples stored in the memory device 108 so that new users may be authenticated by the authentication application so that they may access and store data in the tamperproof storage device 114.
- the wireless communication device 100 may also include a display 116, such as a liquid crystal display, for displaying data, such as the data stored in the tamperproof storage device 114, to a user for a preset amount of time.
- a display 116 such as a liquid crystal display
- data such as the data stored in the tamperproof storage device 114
- the preset amount of time may be user defined or may be set by the authentication application.
- the user may access the tamperproof storage device 114 after termination by providing another biometric sample to authenticate his identity. If authentication is successful, the user will be granted access again for the preset amount of time.
- the wireless communication device 100 may also include a user interface 118, coupled to the processing circuit 102, for allowing the user to input data for storage in the memory device 108 or in the tamperproof storage device 114 of the memory device 108.
- the user interface 118 may include, but is not limited to, a keypad, a keyboard, a microphone and a camera.
- the wireless communication device 100 may allow authorized (i.e. authenticated) users to securely access and store data in the tamperproof storage device 114 and prevent unauthorized users from accessing the data.
- Figure 2 illustrates an alternative configuration of the wireless communication device 100 in Figure 1.
- the tamperproof storage device 114 is a separate memory component within the wireless communication device and is not located within the memory device 108.
- FIG. 3 is a flow diagram illustrating a method operational in a wireless communication device for registering a user with an authentication application of the wireless communication device 300. Users may register with the authentication application which authenticates users and provides them access to the tamperproof storage device for accessing stored data as well as storing new data.
- the wireless communication device may prompt the user to provide a biometric sample using a biometric sensor 302.
- the biometric sensor in the wireless communication device may capture the biometric sample provided by the user 304.
- the wireless communication device may determine whether the captured biometric sample is acceptable for later comparison to a known biometric sample of the user to verify or authenticate the identity of the user 306. If the captured biometric sample is unacceptable, the wireless communication device may prompt the user to provide a new biometric sample 302. If the captured biometric sample is acceptable, the captured biometric sample may be stored or saved in a memory device in the wireless communication device 308. Once the captured biometric sample of the user is stored, the user may be notified that registration was successful on a display of the wireless communication device 310. The registration process may then be ended 312.
- FIG 4 is a flow diagram illustrating a method operational in a wireless communication device for accessing data in a tamperproof storage device of the wireless communication device.
- the tamperproof storage device may be protected from external access, but may be available to an authentication application of the wireless communication device. Users may register with the authentication application which authenticates users and provides them access to the data in the tamperproof storage device.
- the wireless communication device may prompt the user to provide a biometric sample using a biometric sensor 402.
- the biometric sensor in the wireless communication device may capture the biometric sample provided by the user 404.
- the wireless communication device may determine whether the captured biometric sample is acceptable for comparison to a known biometric sample of the user to verify or authenticate the identity of the user 406. If the captured biometric sample is unacceptable, the wireless communication device may prompt the user to provide a new biometric sample 402. If the captured biometric sample is acceptable, the captured biometric sample may be compared to a known biometric sample of the user stored in a memory device in the wireless communication device 408.
- the wireless communication device may determine if the captured biometric sample matches the known biometric sample stored in the wireless communication device 410. If the captured biometric sample does not match the known biometric sample, the wireless communication device may prompt the user to provide a new biometric sample of the user 402. If the captured biometric sample matches the known biometric sample, data stored in a tamperproof storage device of the wireless communication may be extracted 412. The extracted data may then be presented to the user for a preset amount of time on a display 414. The preset amount of time may be user defined or the preset amount of time may be set by the authentication application of the wireless communication device. When the preset amount of time has lapsed, the data may be cleared from the display. The data access may then be ended 416.
- Figure 5 is a flow diagram illustrating a method operational in a wireless communication device for deleting, adding, modifying or viewing data in a tamperproof storage device of the wireless communication device 500.
- the tamperproof storage device may be protected from external access, but may be available to an authentication application of the wireless communication device. Users register with the authentication application which provides access to the data in the tamperproof storage device.
- the wireless communication device may prompt the user to provide a biometric sample 502 using a biometric sensor.
- the biometric sample of the user is captured using the biometric sensor 504.
- the wireless communication device may determine whether the captured biometric sample is acceptable for comparing to a known biometric sample of the user stored in a memory device of the wireless communication device to verify or authenticate the identity of the user 506. If the captured biometric sample is not acceptable, the wireless communication device may prompt the user to provide a new biometric sample 502. If the captured biometric sample is acceptable, the wireless communication device may determine if the user is registered with the authentication application 508.
- the wireless communication device may provide the user with an option of registering with the authentication application 510.
- the wireless communication device may determine if the user wants to register with the authentication application 512. If the user wants to register with the authentication application, the wireless communication device may register the user 514. If the user does not want to register with the authentication application, the wireless communication device may end the authentication application 516.
- the user may be prompted to select whether to delete existing data stored in the tamperproof storage device, adding new data or modify existing data stored in the tamperproof storage device or view data stored in the tamperproof storage device 518.
- the wireless communication device may determine if the user has selected deleting data, adding/modifying data or viewing data in the tamperproof storage device 520.
- the user may be prompted to select the type of data to delete 522.
- the type of data may include usernames, passwords, bank accounts, insurance policy numbers, credit card numbers and the like.
- a list of data saved in the tamperproof storage device associated with the type of data selected by the user to delete may be displayed 524. From the displayed list of data, the user may select the data to delete.
- the wireless communication device may receive the data to delete from the tamperproof storage device which was selected by the user 526.
- the wireless communication device may delete the data selected by the user from the tamperproof storage device 528.
- the wireless communication device may then terminate access to the tamperproof storage device 530 and may end the authentication application 516.
- the user may be prompted to select the type of data to add to the tamperproof storage device or existing data in the tamperproof storage device to modify 532.
- the wireless communication device may determine if the user wants to add new data or modify existing data 534. If the user wants to add new data, the wireless communication device may receive the new data, input by the user, to store or save in the tamperproof storage device 536. The new data may be stored or saved in the tamperproof storage device of the wireless communication device 538. The wireless communication device may then terminate access to the tamperproof storage device 530 and may end the authentication application 516.
- the wireless communication device may display the existing data to modify prior to the user modifying the data to verify that that correct data is being modified 540.
- the wireless communication device may receive the modifications to the data 542.
- the modified data may be saved in the tamperproof storage device 544.
- the wireless communication device may then terminate access to the tamperproof storage device 530 and may end the authentication application 516.
- the wireless communication device may provide the user with the types of data to view 546.
- the wireless communication device may receive the type of data to view selected or specified by the user 548.
- the data selected by the user may be extracted from the tamperproof storage device 550 and presented or displayed for a preset amount of time on a display of the wireless communication device 552. When the preset amount of time has lapsed, the data may be cleared from the display.
- the wireless communication device may then terminate access to the tamperproof storage device 554 and may end the authentication application 516.
- the user may access the tamperproof storage device after termination by providing another biometric sample to authenticate his identity. If authentication is successful, the user will be granted access again for the preset amount of time.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/022,117 US8943326B2 (en) | 2008-01-29 | 2008-01-29 | Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data |
PCT/US2009/032169 WO2009097299A1 (en) | 2008-01-29 | 2009-01-27 | Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data |
Publications (2)
Publication Number | Publication Date |
---|---|
EP2240912A1 true EP2240912A1 (de) | 2010-10-20 |
EP2240912B1 EP2240912B1 (de) | 2016-08-24 |
Family
ID=40456664
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP09706064.4A Not-in-force EP2240912B1 (de) | 2008-01-29 | 2009-01-27 | System und verfahren für den zugang zu einem manipulationssicheren speichergerät in einer drahtlosen kommunikationsvorrichtung anhand biometrischer daten |
Country Status (7)
Country | Link |
---|---|
US (1) | US8943326B2 (de) |
EP (1) | EP2240912B1 (de) |
JP (1) | JP2011512580A (de) |
KR (2) | KR101438869B1 (de) |
CN (1) | CN101933051B (de) |
TW (1) | TW201003572A (de) |
WO (1) | WO2009097299A1 (de) |
Families Citing this family (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2012195747A (ja) * | 2011-03-16 | 2012-10-11 | Nippon Signal Co Ltd:The | 個別情報保護システム |
US20140237589A1 (en) * | 2011-09-29 | 2014-08-21 | Bradley Neal Suggs | Personalization Data of an Active Application |
US8666751B2 (en) * | 2011-11-17 | 2014-03-04 | Microsoft Corporation | Audio pattern matching for device activation |
US9959539B2 (en) | 2012-06-29 | 2018-05-01 | Apple Inc. | Continual authorization for secured functions |
US9819676B2 (en) | 2012-06-29 | 2017-11-14 | Apple Inc. | Biometric capture for unauthorized user identification |
US9832189B2 (en) | 2012-06-29 | 2017-11-28 | Apple Inc. | Automatic association of authentication credentials with biometrics |
US10212158B2 (en) | 2012-06-29 | 2019-02-19 | Apple Inc. | Automatic association of authentication credentials with biometrics |
US10171458B2 (en) | 2012-08-31 | 2019-01-01 | Apple Inc. | Wireless pairing and communication between devices using biometric data |
US20140068725A1 (en) * | 2012-08-31 | 2014-03-06 | Apple Inc. | Wireless Pairing and Communication Between Devices Using Biometric Data |
US9651513B2 (en) | 2012-10-14 | 2017-05-16 | Synaptics Incorporated | Fingerprint sensor and button combinations and methods of making same |
CN102938031A (zh) * | 2012-11-30 | 2013-02-20 | 天津三星光电子有限公司 | 一种电器设备 |
US10331866B2 (en) | 2013-09-06 | 2019-06-25 | Apple Inc. | User verification for changing a setting of an electronic device |
US20150073998A1 (en) | 2013-09-09 | 2015-03-12 | Apple Inc. | Use of a Biometric Image in Online Commerce |
US20150220931A1 (en) | 2014-01-31 | 2015-08-06 | Apple Inc. | Use of a Biometric Image for Authorization |
WO2015126095A1 (ko) * | 2014-02-21 | 2015-08-27 | 삼성전자 주식회사 | 전자 장치 |
WO2016013693A1 (ko) * | 2014-07-22 | 2016-01-28 | 엘지전자 주식회사 | 단말 장치 및 단말 장치의 제어 방법 |
US9646307B2 (en) | 2014-09-23 | 2017-05-09 | Sony Corporation | Receiving fingerprints through touch screen of CE device |
US9953323B2 (en) | 2014-09-23 | 2018-04-24 | Sony Corporation | Limiting e-card transactions based on lack of proximity to associated CE device |
US10262316B2 (en) | 2014-09-23 | 2019-04-16 | Sony Corporation | Automatic notification of transaction by bank card to customer device |
US9558488B2 (en) | 2014-09-23 | 2017-01-31 | Sony Corporation | Customer's CE device interrogating customer's e-card for transaction information |
CN205050141U (zh) | 2014-09-30 | 2016-02-24 | 苹果公司 | 电子设备 |
US10157359B2 (en) * | 2017-02-15 | 2018-12-18 | International Business Machines Corporation | Service device feedback |
US20180241743A1 (en) | 2017-02-21 | 2018-08-23 | Google Inc. | Integrated Second Factor Authentication |
CN209312029U (zh) | 2017-06-04 | 2019-08-27 | 苹果公司 | 电子装置 |
JP7013193B2 (ja) | 2017-10-10 | 2022-01-31 | キヤノン株式会社 | システム、システムの制御方法、音声操作装置、音声操作装置の制御方法、およびプログラム |
JP7066380B2 (ja) * | 2017-11-17 | 2022-05-13 | キヤノン株式会社 | システム、システムにおける方法、情報処理装置、情報処理装置における方法、およびプログラム |
KR102488001B1 (ko) * | 2018-01-22 | 2023-01-13 | 삼성전자주식회사 | 오디오 신호를 이용하여 사용자를 인증하는 전자 장치 및 그 방법 |
US11334662B2 (en) | 2020-07-14 | 2022-05-17 | Bank Of America Corporation | Tamper-evident travel devices equipped with secure re-image file (s) |
KR20220064765A (ko) * | 2020-11-12 | 2022-05-19 | 삼성전자주식회사 | 사용자 인증을 위한 방법 및 그 전자 장치 |
Family Cites Families (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6055637A (en) * | 1996-09-27 | 2000-04-25 | Electronic Data Systems Corporation | System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential |
TW385400B (en) | 1997-08-11 | 2000-03-21 | Ibm | A portable information and transaction processing system and method utilizing biometric authorization and digital certificate security |
JP2000215172A (ja) * | 1999-01-20 | 2000-08-04 | Nec Corp | 個人認証システム |
US6580815B1 (en) | 1999-07-19 | 2003-06-17 | Mandylion Research Labs, Llc | Page back intrusion detection device |
DE10100188B4 (de) | 2001-01-04 | 2010-01-28 | Rohde & Schwarz Gmbh & Co. Kg | Verfahren zum Speichern und Wiederauslesen eines oder mehrerer PIN-Codes |
US6850147B2 (en) | 2001-04-02 | 2005-02-01 | Mikos, Ltd. | Personal biometric key |
JP2003173321A (ja) | 2001-12-05 | 2003-06-20 | Canon Inc | 携帯端末装置 |
JP2004265335A (ja) * | 2003-03-04 | 2004-09-24 | Sony Corp | 情報処理装置および方法、並びにプログラム |
JP2005222095A (ja) | 2004-02-03 | 2005-08-18 | Dainippon Printing Co Ltd | 暗証番号確認用カード |
US7275685B2 (en) * | 2004-04-12 | 2007-10-02 | Rearden Capital Corporation | Method for electronic payment |
US20060107067A1 (en) | 2004-11-15 | 2006-05-18 | Max Safal | Identification card with bio-sensor and user authentication method |
JP2006155159A (ja) | 2004-11-29 | 2006-06-15 | Fuji Electric Holdings Co Ltd | 耐タンパ装置 |
JP2006172180A (ja) | 2004-12-16 | 2006-06-29 | Konica Minolta Business Technologies Inc | 認証装置及び画像形成装置 |
US8000502B2 (en) | 2005-03-09 | 2011-08-16 | Sandisk Technologies Inc. | Portable memory storage device with biometric identification security |
US7664961B2 (en) | 2005-09-12 | 2010-02-16 | Imation Corp. | Wireless handheld device with local biometric authentication |
US20070073619A1 (en) | 2005-09-23 | 2007-03-29 | Smith Rebecca C | Biometric anti-fraud plastic card |
US20070073715A1 (en) * | 2005-09-29 | 2007-03-29 | Zero Global, Inc. | System and method of real time data accessing and initializing commands via wireless communication device |
JP2007102778A (ja) * | 2005-10-04 | 2007-04-19 | Forval Technology Inc | ユーザ認証システムおよびその方法 |
US7877790B2 (en) * | 2005-10-31 | 2011-01-25 | At&T Intellectual Property I, L.P. | System and method of using personal data |
GB2434083B (en) | 2006-01-13 | 2008-04-02 | Paul Richings | A secure wallet |
JP2007241487A (ja) | 2006-03-07 | 2007-09-20 | Shoichiro Yoshimura | 暗証番号等確認装置 |
JP4833712B2 (ja) | 2006-03-29 | 2011-12-07 | 富士通株式会社 | 情報端末装置、秘匿情報管理方法及び秘匿情報管理プログラム |
US7962755B2 (en) * | 2006-04-28 | 2011-06-14 | Ceelox, Inc. | System and method for biometrically secured, transparent encryption and decryption |
US20080046997A1 (en) * | 2006-08-21 | 2008-02-21 | Guardtec Industries, Llc | Data safe box enforced by a storage device controller on a per-region basis for improved computer security |
-
2008
- 2008-01-29 US US12/022,117 patent/US8943326B2/en active Active
-
2009
- 2009-01-27 KR KR1020107019168A patent/KR101438869B1/ko active IP Right Grant
- 2009-01-27 WO PCT/US2009/032169 patent/WO2009097299A1/en active Application Filing
- 2009-01-27 KR KR1020137001621A patent/KR20130019003A/ko not_active Application Discontinuation
- 2009-01-27 CN CN2009801039237A patent/CN101933051B/zh active Active
- 2009-01-27 EP EP09706064.4A patent/EP2240912B1/de not_active Not-in-force
- 2009-01-27 JP JP2010545094A patent/JP2011512580A/ja active Pending
- 2009-02-02 TW TW098103146A patent/TW201003572A/zh unknown
Non-Patent Citations (1)
Title |
---|
See references of WO2009097299A1 * |
Also Published As
Publication number | Publication date |
---|---|
EP2240912B1 (de) | 2016-08-24 |
KR20130019003A (ko) | 2013-02-25 |
CN101933051A (zh) | 2010-12-29 |
US8943326B2 (en) | 2015-01-27 |
WO2009097299A1 (en) | 2009-08-06 |
CN101933051B (zh) | 2013-04-10 |
KR101438869B1 (ko) | 2014-09-05 |
TW201003572A (en) | 2010-01-16 |
US20090193519A1 (en) | 2009-07-30 |
JP2011512580A (ja) | 2011-04-21 |
KR20100114110A (ko) | 2010-10-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8943326B2 (en) | Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data | |
EP3213459B1 (de) | Starker mehrbenutzerauthentifizierungstoken | |
US8191161B2 (en) | Wireless authentication | |
EP2605567B1 (de) | Verfahren und Systeme zur Erhöhung der Sicherheit netzwerkbasierter Transaktionen | |
US7275263B2 (en) | Method and system and authenticating a user of a computer system that has a trusted platform module (TPM) | |
AU2011201164B2 (en) | Methods and Systems for Authenticating Users | |
KR101705472B1 (ko) | 모바일 디바이스 애플리케이션을 위한 플러거블 인증 메커니즘 | |
US9204298B2 (en) | Multilevel authentication | |
AU2016247162B2 (en) | Methods and systems for improving the accuracy performance of authentication systems | |
US20060059569A1 (en) | Application and device user verification from an operating system-based authentication service | |
WO2014008228A1 (en) | Credential quality assessment engine systems and methods | |
US8433288B2 (en) | Multilevel authentication | |
US9122857B1 (en) | Authenticating a user in an authentication system | |
US20130198836A1 (en) | Facial Recognition Streamlined Login | |
US20190260740A1 (en) | System, Method, and Apparatus for Data Access Security | |
KR20060124206A (ko) | 사용자 인증 방법 및 시스템 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20100825 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA RS |
|
17Q | First examination report despatched |
Effective date: 20101223 |
|
DAX | Request for extension of the european patent (deleted) | ||
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R079 Ref document number: 602009040588 Country of ref document: DE Free format text: PREVIOUS MAIN CLASS: G07C0009000000 Ipc: G06F0021790000 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G07C 9/00 20060101ALI20160301BHEP Ipc: G06F 21/79 20130101AFI20160301BHEP Ipc: G06F 21/78 20130101ALI20160301BHEP |
|
INTG | Intention to grant announced |
Effective date: 20160317 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 823657 Country of ref document: AT Kind code of ref document: T Effective date: 20160915 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602009040588 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: MP Effective date: 20160824 |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 823657 Country of ref document: AT Kind code of ref document: T Effective date: 20160824 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 9 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160824 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161124 Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160824 Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160824 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160824 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160824 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160824 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160824 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160824 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161125 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160824 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161226 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160824 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160824 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602009040588 Country of ref document: DE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160824 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160824 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160824 Ref country code: BE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160824 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160824 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161124 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20170526 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160824 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160824 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170131 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170131 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170127 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 10 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20171220 Year of fee payment: 10 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170127 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20171228 Year of fee payment: 10 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20180109 Year of fee payment: 10 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170127 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20090127 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 602009040588 Country of ref document: DE |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20190127 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20190131 Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20190801 Ref country code: CY Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20160824 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160824 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20190127 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160824 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161224 |